Post Job Free
Sign in

Security Operations Center

Location:
Columbus, OH
Posted:
August 19, 2024

Contact this candidate

Resume:

Brigitte Richelle Dooh Moudoute

Security Operations Center (SOC) Analyst

Phone 770-***-****

Email *****************@*****.***

Address Cincinnati, OH

CAREER OBJECTIVE

A resourceful, self-motivated, goal-driven, and result-oriented cybersecurity professional with great accomplishments in working network, endpoint, and phishing investigations. Performing Intrusion Detection, Vulnerability Assessment, Incident Response, and strategies needed to safeguard highly sensitive systems, data, and communications resources.

EXPERIENCE

SECURITY OPERATION CENTER (SOC) ANALYST — Pitch Technologies

Cincinnati, OH, Feb 2020 - Present

Fully documenting assigned tickets to show all work performed and attach the required artifacts to pass SLRs

Monitored and analyzed incoming security alarms against cyber threats.

Monitored and responded to security incidents and alerts in an on-premises and cloud hybrid environment.

Developed and fine-tuned content rules for security events.

Identified and extracted IOCs from malicious code, including file hashes, domain names, IP addresses, and registry keys.

Provide detection, investigation, and response support for cloud platforms including AWS, Azure, and Google Cloud.

Utilized sandbox environments such as Cuckoo Sandbox and FireEye to safely execute and observe malware behavior.

Creating Firewall indicator sets with updated indicators of compromise.

Provided cyber security solution with the integration of ATAR (Automated Threat Analysis and Response) for different customers.

Perform real-time security event monitoring, Incident handling and response, Log management, and correlation using different SIEM and security tools.

Respond to security incidents of network intrusion and policy violations in a timely & proactive manner to ensure proper mitigation of security issues.

Handle tickets for end users request through ticketing tool ServiceNow.

Analyze network and host-based security appliance logs (Firewalls, Workstations) to determine the correct remediation actions and escalation paths.

Assist in developing and updating (Standard Operation Procedure) and playbooks for different incidents.

Work on improvements for provided security services, including the continuous enhancement of existing methodology material, and supporting assets for different clients.

Trained new analysts on network/host-based, malware, email security investigations.

Provide L2 support for SIEM security technologies, handle service requests and Security Incidents

Triaging and investigating incoming alerts generated from Splunk ES to determine the severity and impact of the event or incidents.

Reviewing and collecting asset data; indicators of compromise, logs, configurations and running processes, on these systems for further investigation and reporting.

Involved in planning and implementing preventative security measures and in building incident response and disaster recovery plans.

Using CrowdStrike to perform real time response (RTR) to manually eradicate any possible persistent IOC.

Investigating, analyzing, and processing retrospective and reported phishing email alerts from Proofpoint while following standard operating procedures. Further using O365 Threat Explorer to analyze and determine the scope of the phishing campaign.

Evaluating and processing Web Site Review Requests from internal users to access blocked websites using OSINT tools and business justification.

Utilizing CloudTrail, CloudWatch and VPC flow logs to investigate suspicious activities associated with EC2 instances, S3 buckets, IAM, API calls and other AWS resources

Collaborating with the AWS security team to enhance security monitoring and detection capabilities in AWS environments

Analyzing and resolving DLP alerts from McAfee DLP Manager and Splunk Enterprise Security (Splunk ES) and escalating cyber privacy incidents to the Privacy Team.

Working incidents from initial assignment to final resolution.

Assisting in building SOPs as needed or directed to facilitate SOC operations and processes.

Fully documenting assigned tickets to show all work performed and attached the required artifacts.

Performing Root Cause Analysis (RCA) and making preventative recommendations for incidents and events.

Assisting in creating new use cases followed by performing SOC testing

Conducting deep dive endpoint investigations using CrowdStrike EDR to determine the possible impact of an intrusion attempt.

Recognizing potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools like Splunk and CrowdStrike EDR

Creating, tracking, and working to resolute normal and standard job-related change requests

Assisting with the creation of daily/monthly SOC reports and shift reports alongside pass down emails/information to the incoming team

Participating in daily security meetings with team members and customer teams.

DATABASE ADMINISTRATOR — World Park

Cincinnati, OH, July 2017 - Feb 2020

Provided 24x7 Production database support in Applications Development areas regarding database program design, implementation, and performance.

Extensively used Oracle Enterprise Manager (OEM) for Monitoring Sqls, Generating SQLs Explain plans, Generate AWR, ADDM and ASH reports, Generating Information Publisher Reports, Oracle database online patching etc.

Daily monitoring of databases validating Veritas NetBackups to make sure they complete with no errors.

Collaborated with DBA team to ensure timely data reloads to the ODS using the SQDATA capture agent.

Monitored production databases for space utilization and the need for design change or reorganization.

Participated in reviews to evaluate database performance and recommend solutions to ensure the effectiveness of scheme, tables, procedures, and permissions.

Tested database performance issues (monitoring and tuning) to ensure database optimization.

Defined and allocated space for all test databases

Participated in reviews to evaluate database performance and recommend solutions to ensure the effectiveness of scheme, tables, procedures, and permissions.

Implemented Oracle database backup & recovery solutions using RMAN as well as conventional backup methods EXPDP and IMPDP.

Assisted the Database Administration Supervisor with configuration management and database control programming.

Partitioned large tables to improve Performance

Automated database Performance reports

Provided status reports to the Database Administration Supervisor for all active and scheduled projects.

Created user accounts, roles and grant required access permissions and privileges to users based on the applications they are accessing.

Monitored standards and procedures to ensure recoverability and availability of production databases. Participate in disaster recovery testing efforts.

Assisted Lead DBA in the maintenance of the assigned DBMS-based application system and the associated security procedures.

Developed UNIX shell scripts and SQL scripts to carry out routine checks on databases.

Performed point-in-time recovery.

EDUCATION

BACHELOR OF SCIENCE (B.S.) IN CYBERSECURITY ENGINEERING (In Progress)

University of Cincinnati

SKILLS

Malware Analysis/Endpoint Security

Network Security Protocols/TCP/IP

Jira ServiceNow Confluence

McAfee Web Gateway Bluecoat

FireEye Palo Alto/Cisco IronPort

Microsoft Office 356 SharePoint OneDrive

Firepower Cyber Kill chain Mitre Att&ck

Incident Response/Cyber Threat Intelligence

Cloud Computing

Splunk CrowdStrike Nessus

O365 Snort Firepower FireEye

Linux Windows Active Directory

Virus Total Domain Tools IP/URL void, IBM X-Force

Anyrun Threat Grid Sandbox

CERTIFICATIONS

CompTIA Security +

Splunk Fundamentals 1

Pen Testing

Network +



Contact this candidate